-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dtale | pip | < 3.7.0 | 3.7.0 |
The vulnerability stems from the 'Custom Filter' feature allowing arbitrary pandas query input. The test_filter function in views.py directly handles the user-provided 'query' parameter. In versions <3.7.0, this endpoint executed queries without the 'enable_custom_filters' safety check (added in the patch). Pandas queries can execute arbitrary Python code through @pd.eval expressions, making this a code injection vector. The commit adds validation gates around this function, confirming its role in the vulnerability.
Ongoing coverage of React2Shell